Chinaunix首页 | 论坛 | 博客
  • 博客访问: 196725
  • 博文数量: 77
  • 博客积分: 1749
  • 博客等级: 上尉
  • 技术积分: 810
  • 用 户 组: 普通用户
  • 注册时间: 2011-03-28 18:27
文章分类
文章存档

2012年(28)

2011年(49)

分类: IT业界

2012-10-25 22:18:52

zz: Cylab

While Trusted Computing is the most visible aspect of this research area, we show that
many of the techniques used by Trusted Computing date back to the 1980s [66]. ese ideas
thus extend beyond Trusted Computing’s TPM to the general concept of bootstrapping trust
in commodity computers. is fact becomes all the more relevant as cellphones emerge as
the next major computing platform (as of 2005, the number of cellphones worldwide was
about double the number of personal computers [80, 207]). In fact, many cellphones already
incorporate stronger hardware support for security than many desktop computers and use
some of the techniques described in this chapter [14, 16]. Indeed, as CPU transistor counts
continue to climb, CPU vendors are increasingly willing to provide hardware support for
secure systems (see, for example, Intel and AMD’s support for virtualization [3, 95], and
Intel’s new AES instructions, which provide greater e›ciency and resistance to side-channel
attacks [81]). us, research in this area can truly guide the development of new hardware 
supported security features.
阅读(981) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~